关注
Donghua Wang
Donghua Wang
在 zju.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fca: Learning a 3d full-coverage vehicle camouflage for multi-view physical adversarial attack
D Wang, T Jiang, J Sun, W Zhou, Z Gong, X Zhang, W Yao, X Chen
Proceedings of the AAAI conference on artificial intelligence 36 (2), 2414-2422, 2022
762022
Targeted speech adversarial example generation with generative adversarial network
D Wang, L Dong, R Wang, D Yan, J Wang
IEEE Access 8, 124503-124513, 2020
342020
A survey on physical adversarial attack in computer vision
D Wang, W Yao, T Jiang, G Tang, X Chen
arXiv preprint arXiv:2209.14262, 2022
302022
Rfla: A stealthy reflected light adversarial attack in the physical world
D Wang, W Yao, T Jiang, C Li, X Chen
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
212023
Adversarial examples attack and countermeasure for speech recognition system: A survey
D Wang, R Wang, L Dong, D Yan, X Zhang, Y Gong
International Conference on Security and Privacy in Digital Economy, 443-468, 2020
212020
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors
J Sun, W Yao, T Jiang, D Wang, X Chen
Neural Networks 163, 256-271, 2023
132023
Natural weather-style black-box adversarial attacks against optical aerial detectors
G Tang, W Yao, T Jiang, W Zhou, Y Yang, D Wang
IEEE Transactions on Geoscience and Remote Sensing, 2023
82023
Improving transferability of universal adversarial perturbation with feature disruption
D Wang, W Yao, T Jiang, X Chen
IEEE Transactions on Image Processing, 2023
62023
Fast speech adversarial example generation for keyword spotting system with conditional GAN
D Wang, L Dong, R Wang, D Yan
Computer Communications 179, 145-156, 2021
52021
An invisible, robust copyright protection method for DNN-generated content
D Wang, W Yao, T Jiang, W Zhou, L Lin, X Chen
Neural Networks 177, 106391, 2024
2*2024
AdvOps: Decoupling adversarial examples
D Wang, W Yao, T Jiang, X Chen
Pattern Recognition 149, 110252, 2024
22024
Defending and Detecting Audio Adversarial Example using Frame Offsets.
Y Gong, D Yan, T Mao, D Wang, R Wang
KSII Transactions on Internet & Information Systems 15 (4), 2021
22021
Efficient generation of speech adversarial examples with generative model
D Wang, R Wang, L Dong, D Yan, Y Ren
International Workshop on Digital Watermarking, 251-264, 2020
22020
Adversarial Examples in the Physical World: A Survey
J Wang, D Wang, J Hu, S Wu, T Jiang, W Yao, A Liu, X Liu
arXiv preprint arXiv:2311.01473, 2023
12023
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
D Wang, W Yao, T Jiang, C Li, X Chen
arXiv preprint arXiv:2407.06688, 2024
2024
Improving the Transferability of Adversarial Examples by Feature Augmentation
D Wang, W Yao, T Jiang, X Zheng, J Wu, X Chen
arXiv preprint arXiv:2407.06714, 2024
2024
Universal Perturbation-based Secret Key-Controlled Data Hiding
D Wang, W Yao, T Jiang, X Chen
arXiv preprint arXiv:2311.01696, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–17